====================================================== WARNING: possible circular locking dependency detected 6.2.0-rc1-syzkaller-00084-gc8451c141e07 #0 Not tainted ------------------------------------------------------ syz-executor945/5157 is trying to acquire lock: ffff8880282f23f8 (&journal->j_checkpoint_mutex){+.+.}-{3:3}, at: __jbd2_log_wait_for_space+0x22d/0x790 fs/jbd2/checkpoint.c:110 but task is already holding lock: ffff8880739bca38 (&sb->s_type->i_mutex_key#7){++++}-{3:3}, at: inode_lock include/linux/fs.h:756 [inline] ffff8880739bca38 (&sb->s_type->i_mutex_key#7){++++}-{3:3}, at: ext4_buffered_write_iter+0xae/0x3a0 fs/ext4/file.c:279 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #1 (&sb->s_type->i_mutex_key#7){++++}-{3:3}: lock_acquire+0x1a7/0x400 kernel/locking/lockdep.c:5668 down_read+0x39/0x50 kernel/locking/rwsem.c:1509 inode_lock_shared include/linux/fs.h:766 [inline] ext4_bmap+0x55/0x410 fs/ext4/inode.c:3243 bmap+0xa1/0xd0 fs/inode.c:1798 jbd2_journal_bmap fs/jbd2/journal.c:977 [inline] __jbd2_journal_erase fs/jbd2/journal.c:1789 [inline] jbd2_journal_flush+0x5d0/0xca0 fs/jbd2/journal.c:2492 ext4_ioctl_checkpoint fs/ext4/ioctl.c:1082 [inline] __ext4_ioctl fs/ext4/ioctl.c:1590 [inline] ext4_ioctl+0x3288/0x5400 fs/ext4/ioctl.c:1610 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:870 [inline] __se_sys_ioctl+0xfb/0x170 fs/ioctl.c:856 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd -> #0 (&journal->j_checkpoint_mutex){+.+.}-{3:3}: check_prev_add kernel/locking/lockdep.c:3097 [inline] check_prevs_add kernel/locking/lockdep.c:3216 [inline] validate_chain+0x184a/0x6470 kernel/locking/lockdep.c:3831 __lock_acquire+0x1292/0x1f60 kernel/locking/lockdep.c:5055 lock_acquire+0x1a7/0x400 kernel/locking/lockdep.c:5668 __mutex_lock_common+0x1de/0x26c0 kernel/locking/mutex.c:603 mutex_lock_io_nested+0x43/0x60 kernel/locking/mutex.c:833 __jbd2_log_wait_for_space+0x22d/0x790 fs/jbd2/checkpoint.c:110 add_transaction_credits+0x936/0xbf0 fs/jbd2/transaction.c:298 start_this_handle+0x758/0x1660 fs/jbd2/transaction.c:422 jbd2__journal_start+0x2ca/0x5b0 fs/jbd2/transaction.c:520 __ext4_journal_start_sb+0x13b/0x1f0 fs/ext4/ext4_jbd2.c:111 __ext4_journal_start fs/ext4/ext4_jbd2.h:326 [inline] ext4_dirty_inode+0x8d/0x100 fs/ext4/inode.c:6107 __mark_inode_dirty+0x1e7/0x600 fs/fs-writeback.c:2419 generic_update_time fs/inode.c:1859 [inline] inode_update_time fs/inode.c:1872 [inline] __file_update_time fs/inode.c:2057 [inline] file_modified_flags+0x69a/0x700 fs/inode.c:2130 ext4_write_checks+0x249/0x2c0 fs/ext4/file.c:264 ext4_buffered_write_iter+0xbc/0x3a0 fs/ext4/file.c:280 ext4_file_write_iter+0x1d0/0x1900 __kernel_write_iter+0x323/0x770 fs/read_write.c:517 dump_emit_page+0xa79/0xca0 fs/coredump.c:864 dump_user_range+0x5b/0xf0 fs/coredump.c:915 elf_core_dump+0x3ca3/0x45d0 fs/binfmt_elf.c:2137 do_coredump+0x180a/0x27d0 fs/coredump.c:762 get_signal+0x1490/0x1820 kernel/signal.c:2845 arch_do_signal_or_restart+0x8d/0x5f0 arch/x86/kernel/signal.c:306 exit_to_user_mode_loop+0x74/0x160 kernel/entry/common.c:168 exit_to_user_mode_prepare+0xad/0x110 kernel/entry/common.c:203 irqentry_exit_to_user_mode+0x5/0x30 kernel/entry/common.c:309 exc_page_fault+0xa2/0x120 arch/x86/mm/fault.c:1578 asm_exc_page_fault+0x22/0x30 arch/x86/include/asm/idtentry.h:570 other info that might help us debug this: Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&sb->s_type->i_mutex_key#7); lock(&journal->j_checkpoint_mutex); lock(&sb->s_type->i_mutex_key#7); lock(&journal->j_checkpoint_mutex); *** DEADLOCK *** 2 locks held by syz-executor945/5157: #0: ffff888028d4e460 (sb_writers#4){.+.+}-{0:0}, at: do_coredump+0x17e5/0x27d0 fs/coredump.c:761 #1: ffff8880739bca38 (&sb->s_type->i_mutex_key#7){++++}-{3:3}, at: inode_lock include/linux/fs.h:756 [inline] #1: ffff8880739bca38 (&sb->s_type->i_mutex_key#7){++++}-{3:3}, at: ext4_buffered_write_iter+0xae/0x3a0 fs/ext4/file.c:279 stack backtrace: CPU: 1 PID: 5157 Comm: syz-executor945 Not tainted 6.2.0-rc1-syzkaller-00084-gc8451c141e07 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 Call Trace: __dump_stack lib/dump_stack.c:88 [inline] dump_stack_lvl+0x1e3/0x2d0 lib/dump_stack.c:106 check_noncircular+0x2f9/0x3b0 kernel/locking/lockdep.c:2177 check_prev_add kernel/locking/lockdep.c:3097 [inline] check_prevs_add kernel/locking/lockdep.c:3216 [inline] validate_chain+0x184a/0x6470 kernel/locking/lockdep.c:3831 __lock_acquire+0x1292/0x1f60 kernel/locking/lockdep.c:5055 lock_acquire+0x1a7/0x400 kernel/locking/lockdep.c:5668 __mutex_lock_common+0x1de/0x26c0 kernel/locking/mutex.c:603 mutex_lock_io_nested+0x43/0x60 kernel/locking/mutex.c:833 __jbd2_log_wait_for_space+0x22d/0x790 fs/jbd2/checkpoint.c:110 add_transaction_credits+0x936/0xbf0 fs/jbd2/transaction.c:298 start_this_handle+0x758/0x1660 fs/jbd2/transaction.c:422 jbd2__journal_start+0x2ca/0x5b0 fs/jbd2/transaction.c:520 __ext4_journal_start_sb+0x13b/0x1f0 fs/ext4/ext4_jbd2.c:111 __ext4_journal_start fs/ext4/ext4_jbd2.h:326 [inline] ext4_dirty_inode+0x8d/0x100 fs/ext4/inode.c:6107 __mark_inode_dirty+0x1e7/0x600 fs/fs-writeback.c:2419 generic_update_time fs/inode.c:1859 [inline] inode_update_time fs/inode.c:1872 [inline] __file_update_time fs/inode.c:2057 [inline] file_modified_flags+0x69a/0x700 fs/inode.c:2130 ext4_write_checks+0x249/0x2c0 fs/ext4/file.c:264 ext4_buffered_write_iter+0xbc/0x3a0 fs/ext4/file.c:280 ext4_file_write_iter+0x1d0/0x1900 __kernel_write_iter+0x323/0x770 fs/read_write.c:517 dump_emit_page+0xa79/0xca0 fs/coredump.c:864 dump_user_range+0x5b/0xf0 fs/coredump.c:915 elf_core_dump+0x3ca3/0x45d0 fs/binfmt_elf.c:2137 do_coredump+0x180a/0x27d0 fs/coredump.c:762 get_signal+0x1490/0x1820 kernel/signal.c:2845 arch_do_signal_or_restart+0x8d/0x5f0 arch/x86/kernel/signal.c:306 exit_to_user_mode_loop+0x74/0x160 kernel/entry/common.c:168 exit_to_user_mode_prepare+0xad/0x110 kernel/entry/common.c:203 irqentry_exit_to_user_mode+0x5/0x30 kernel/entry/common.c:309 exc_page_fault+0xa2/0x120 arch/x86/mm/fault.c:1578 asm_exc_page_fault+0x22/0x30 arch/x86/include/asm/idtentry.h:570 RIP: 0033:0x7fe326900784 Code: 01 8c 0b 00 01 5d c3 0f 1f 80 00 00 00 00 c3 0f 1f 80 00 00 00 00 e9 7b ff ff ff 66 2e 0f 1f 84 00 00 00 00 00 90 48 83 ec 08 <64> 8b 04 25 bc ff ff ff 85 c0 75 40 48 8b 46 10 64 8b 14 25 b8 ff RSP: 002b:00007ffe337e0370 EFLAGS: 00010202 RAX: 0000000000000000 RBX: 0000000000000000 RCX: 00007fe32693f8c9 RDX: 00007ffe337e0380 RSI: 00007ffe337e04b0 RDI: 000000000000000b RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000040b86000 R10: 00007ffe338de4d0 R11: 0000000000000246 R12: 0000000000087ece R13: 00007ffe338de640 R14: 00007ffe338de630 R15: 00007ffe338de5fc syz-executor945 (5157) used greatest stack depth: 18360 bytes left